4350 Executive Drive, Suite 100 San Diego, CA 92121 San Diego (858) 546-1400 Ethical Hacking and Countermeasures v5 Length: Five Days Summary: The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. You will understand and know how to look for weaknesses and vulnerabilities in targeted systems, and use the same knowledge and tools as a malicious hacker. If you're concerned about the integrity of your network's infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) v7 to enhance your network's defenses. You'll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you'll learn how intruders operate and the steps you can take to secure a system. In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation. In addition to learning how to scan, test, hack, and secure a system, you'll prepare for the latest Certified Ethical Hacker exam from EC-Council. _____________________________________________________________________________ Course Content MODULE 7: SNIFFERS MODULE 8: DENIAL OF SERVICE MODULE 1: INTRODUCTION TO ETHICAL HACKING MODULE 9: SOCIAL ENGINEERING MODULE 2: FOOTPRINTING MODULE 10: SESSION HIJACKING MODULE 3: SCANNING MODULE 11: HACKING WEB SERVERS MODULE 4: ENUMERATION MODULE 12: WEB APPLICATION VULNERABILITIES MODULE 5: SYSTEM HACKING MODULE 13: WEB-BASED PASSWORD MODULE 6: TROJANS AND CRACKING TECHNIQUES BACKDOORS MODULE 14: SQL INJECTION NDA: NON-DISCLOSURE AGREEMENT 4350 Executive Drive, Suite 100 San Diego, CA 92121 San Diego (858) 546-1400 MODULE 15: HACKING WIRELESS LAB 2.1 USE SAMSPADE NETWORKS LAB 2.2 USE WEB DATA EXTRACTOR MODULE 16: VIRUS TO FOOTPRINT A WEBSITE MODULE 17: PHYSICAL SECURITY LAB 2.3 USE GEO SPIDER TO FOOTPRINT A WEBSITE MODULE 18: LINUX HACKING LAB 2.4 USE NEOTRACE TO FOOTPRINT MODULE 19: EVADING IDS, FIREWALLS A WEBSITE AND DETECTING HONEY POTS LAB 2.5 USE WHICH ISP OWNS IP TO MODULE 20: BUFFER OVERFLOWS MODULE 21: CRYPTOGRAPHY MODULE 22: PENETRATION TESTING MODULES 23-26: ADVANCED MODULES FOOTPRINT A NETWORK ADDRESS LAB 2.6 USE WHEREISIP TO FOOTPRINT A NETWORK ADDRESS LAB 2.7 USE MY IP SUITE TO FOOTPRINT A NETWORK ADDRESS LAB MANUAL: ETHICAL HACKING AND COUNTERMEASURES CEHV5 LAB 2.8 USE WAY BACK MACHINE TO VIEW WEB HISTORY LAB 1.1 VISITS THE SECURITEAM WEBSITE AND ANALYZES VULNERABILITIES LAB 1.2 VISIT THE U.S. CYBERCRIME WEBSITE LAB 2.9 USE PUBLIC WEBSITES FOR FOOTPRINTING LAB 2.10 USE KARTOO VISUAL BROWSER FOR FOOTPRINTING A COMPANY’S NETWORK LAB 1.3 VISIT VARIOUS HACKER WEBSITES LAB 2.11 USE YAHOO PEOPLE FOR FOOTPRINTING AN INDIVIDUAL LAB 1.4 READ ETHICAL HACKING AGREEMENT LAB 2.12 USE INTELLIUS FOR FOOTOPRINTING AN INDIVIDUAL 4350 Executive Drive, Suite 100 San Diego, CA 92121 San Diego (858) 546-1400 LAB 2.13 USE GOOGLE EARTH LAB 3.6 SCAN THE NETWORK USING FLOPPYSCAN LAB 2.14 MIRROR A WEBSITE LAB 3.7 BANNER GRABBING USING LAB 2.15 EMAIL TRACKING LAB 2.16 SEARCH THE INTERNET FOR EMAIL ADDRESSES LAB 2.17 GEOWHERE – QUERY TELNET LAB 3.8 BANNER GRABBING USING NETCRAFT LAB 3.9 HTTP TUNNELING MULTIPLE SEARCH ENGINES AT ONCE, FIND AND TEST PROXIES, GET DAILY LAB 3.10 BLOCK AND RESTORE TOPNEWS COOKIES G-ZAPPER LAB 2.18 WEB THE RIPPER LAB 3.11 GLOBAL NETWORK INVENTORY LAB 2.19 WEBSITE WATCHER LAB 3.12 MEGA PING LAB 2.20 WHOIS LAB 4.1 CONNECT VIA A NULL SESSION LAB 3.1 USE NMAP TO PORTSCAN A WEBSITE LAB 4.2 USE GETACCT TO ENUMERATE USERS LAB 3.2 USE ANGRY IP TO CHECK FOR LIVE HOSTS LAB 4.3 USE SUPERSCAN 4 TO ENUMERATE USERS LAB 3.3 SCAN THE NETWORK USING HPING2 FOR WINDOWS LAB 4.4 USE SNMP SCANNER LAB 3.4 SCAN THE NETWORK USING LAB 4.5 USE WINFINGERPRINT TO NETSCAN TOOLS PRO ENUMERATE SERVICES LAB 3.5 SCAN THE NETWORK USING LAB 5.1 USE L0PHTRACK TO SUPERSCAN 4 BRUTEFORCE SAM PASSWORDS 4350 Executive Drive, Suite 100 San Diego, CA 92121 San Diego (858) 546-1400 LAB 5.2 EXTRACT SAM HASHES USING LAB 5.15 BRUTE FORCE PASSWORD PWDUMP ESTIMATION TOOL LAB. 5.3 PRIVILEGE ESCALATION LAB 5.16 MASKER STENOGRAPHY USING X.EXE TOOL LAB 5.4 EXECUTE COMMANDS ON A LAB 5.17 MAX FILE ENCRYPTION REMOTE COMPUTER LAB 5.18 MERGE STREAMS LAB 5.5 EMAIL KEYLOGGER LAB 5.19 ROOTKIT REVEALER – LAB 5.6 USE THE “KLOGGER” ROOTKIT DETECTION UTILITY KEYLOGGER LAB 5.20 TRACELESS LAB 5.7 USE DESKTOP SPY TO CAPTURE SCREEN IMAGES LAB 5.8 NTFS STREAMS LAB 5.9 USE FU ROOTKIT TO HIDE FILES AND PROCESSES LAB 5.10 USE CAMERA/SHY TO VIEW LAB 5.21 RAINBOWCRACK LAB 5.22 INVISIBLE SECRETS 4 LAB 6.1 TINI TROJAN LAB 6.2 NETBUS TROJAN LAB 6.3 NETCAT TROJAN HIDDEN FILES LAB 6.4 BEAST TROJAN LAB 5.11 USE SPAMMIMIC TO HIDE MESSAGES LAB 6.5 USE WRAPPERS LAB 5.12 USE SNOW TO HIDE LAB 6.6 PROXY TROJAN INFORMATION LAB 6.7 ATELIER WEB COMMANDER LAB 5.13 USE AUDITPOL TO ENABLE/DISABLE AUDITING LAB 6.8 USE TCPVIEW TO MONITOR THE NETWORK CONNECTIONS LAB 5.14 ADS SPY 4350 Executive Drive, Suite 100 San Diego, CA 92121 San Diego (858) 546-1400 LAB 6.9 WHAT’S ON MY COMPUTER LAB 7.6 MAC FLOODING LAB 6.10 USE PROCESS VIEWER TO LAB 7.7 DNS POISONING VIEW THE RUNNING PROCESSES LAB 7.8 EFFETECH SNIFFER LAB 6.11 USE MSCONFIG TO VIEW THE STARTUP PROGRAMS LAB 6.12 USE MD5SUM TO CREATE DIGITAL FILE SIGNATURES LAB 6.13 CHECK THE REGISTRY FOR TROJAN STARTUP ENTRIES LAB 6.14 CURRPORTS LAB 6.15 FAST SUM – USING MD5 CHECKSUM LAB 6.16 NETSTAT LAB 6.17 ADDITIONAL LABS LAB 7.1 USE ETHEREAL TO SNIFF THE LAB 7.9 PASSOWRD SNIFFER LAB 7.10 CAIN AND ABEL LAB 7.11 PACKET CRAFTER LAB 7.12 SMAC – SPOOFING MAC ADDRESS LAB 8.1 FREAK88 – DISTRIBUTED DENIAL-OF-SERVICE LAB 8.2 PING OF DEATH LAB 8.3 IMAGEWOLF BOT LAB 8.4 DOS ATTACK USING NEMESYS LAB 8.5 DOS ATTACK USING PANTHER NETWORK LAB 8.6 DDOS PING ATTACK LAB 7.2 USE WINDUMP TO SNIFF THE NETWORK LAB 9.1 READ SOCIAL ENGINEERING STORY LAB 7.3 NETWORK VIEW LAB 9.2 PHISHING ATTACK – FAKE LAB 7.4 ETTERCAP LAB 7.5 ETTERCAP-NG (NEXT GENERATION) ADDRESS BAR LAB 9.3 PHISHING ATTACK – FAKE STATUS BAR 4350 Executive Drive, Suite 100 San Diego, CA 92121 San Diego (858) 546-1400 LAB 9.4 PHISHING ATTACK – FAKE LAB 12.3 FOOTPRINT A WEBSITE USING TOOLBAR WGET LAB 9.5 IP ADDRESS CONVERSION LAB 12.4 FOOTPRINT A WEBSITE USING AN ACCESS DIVER LAB 9.6 NETCRAFT ANTI-PHISHING TOOLBAR LAB 12.4 UNICODE STRINGS LAB 10.1 SESSION HIJACKING LAB 12.5 ACUNETIX WEB ANALYSIS VULERABILITY SCANNER LAB 10.2 SESSION HIJACKING USING LAB 13.1 OBIWAN PASSWORD PAROS CRACKING TOOL LAB 11.1 EXPLOIT WINDOWS 2000 LAB 13.2 BRUTUS PASSWORD CRACKING TOOL LAB 11.2 RPC EXPLOIT LAB 13.3 DICTIONARY MAKER LAB 11.3 METASPOIT EXPLOIT LAB 13.4 SNADBOY – PASSWORD LAB 11.4 VULNERABILITY ASSESSMENT REVELATION USING SHADOW SECURITY SCANNER LAB 13.5 COOKIE SPY LAB 11.5 NESSUS FOR WINDOWS LAB 13.6 PASSWORD RECOVERY TIME LAB 11.6 MICROSOFT BASELINE SIMULATOR SECURITY ANALYZER LAB 13.7 ROCKXP LAB 11.7 QFECHECK LAB 14.1 JUGGYBANK SQL LAB 12.1 E-SHOPPING USING HIDDEN INTERJECTION VALUES LAB 14.2 SQL INTERJECTION LAB 12.2 FOOTPRINT A WEBSITE USING WHITEPAPER BLACKWIDOW LAB 15.1 AIROPEEK 4350 Executive Drive, Suite 100 San Diego, CA 92121 San Diego (858) 546-1400 LAB 16.1 WRITE A SIMPLE VIRUS LAB 22.6 SQL STRIPES LAB 16.2 USE VIRUS CONSTRUCTION LAB 22.7 TRACE ROUTE KITS LAB 22.8 WINDOWS SECURITY OFFICER LAB 16.3 VIRUS ANALYSIS USING IDA PRO LAB 16.4 A2 SCANNER LAB 16.5 AVG SCANNER LAB 16.6 MCAFEE LAB 16.7 NORTON INTERNET SECURITY LAB 17.1 MIT DOCUMENT LAB 18.1 LAB 19.1 INSTALL AND RUN SNORT LAB 19.2 INSTALL AND TRAPSERVER LAB 20.1 COMPILE AND EXECUTE A SIMPLE BUFFER OVERFLOW PROGRAM LAB 22.1 AZURE WEB LOG LAB 22.2 IINVENTORY LAB 22.3 LINK UTILITY LAB 22.4 MAXCRYPT LAB 22.5 SNIFF’EM